cybercriminals
New twists to previously-existing cyber scams
FBI’s Internet Crime Complaint Center (IC3) has released a report detailing recent cyber crime trends and new twists to previously-existing cyber scams. Among them is a …
Copied Android apps sold on Google Play at higher prices
App developer Root Uninstaller claims that some of his original apps for the Android platform have been copied and are currently being sold on Google Play. He offers the …
Conficker targets photography lovers
People who bought a Hama-manufactured slide scanner from popular German retailer chain Tchibo in the weeks leading to Christmas are being warned about taking home more than …
IE zero-day used in targeted watering hole attacks
News that an Internet Explorer zero-day vulnerability was being and has been for quite some time been used in a new “watering hole” attack has livened the …
Most unique viruses of 2012
PandaLabs outlined its picks for the most unique viruses of the past year. Rather than a ranking of the most widespread viruses, or those that have caused most infections, …
Phishing techniques, consequences and protection tips
In this interview, Rohyt Belani, CEO at PhishMe, illustrates the magnitude of the phishing threat. He discusses techniques, consequences and protection tips. What happens once …
Mobile malware, botnets and attacks on the cloud to rise
ESET has published its annual review of the past year’s threat trends and compiled predictions for 2013. According to the new report, the 2013 threatscape will see major …
“Change Facebook color theme” scam leads to spying Chrome extension
The end of one year and the beginning of another strikes a lot of people as the perfect moment to change something in their life and start with the proverbial clean slate. …
Vulnerabilities in Java and Adobe to become main targets for cybercriminals
Software vulnerabilities will be the main target of cyber-criminals next year, according to a list of security trends that will dominate in 2013 by PandaLabs. “It is …
Sudoku puzzle generating spreadsheet carries malware
Sudoku lovers, beware! Your love for solving the popular puzzle could just be the right entrance point cyber criminals need to saddle you with information-stealing malware. …
“Facebook 2013 Demo app” leads to phishing
The offer of an app that supposedly allows users to view a new version of Facebook is the newest trick employed by phishers to get their hands on the users’ login …
Will the Sweet Orange exploit kit dethrone Blackhole?
There’s a new exploit kit being offered for sale and it seems to be slowly but surely gaining in popularity. Dubbed Sweet Orange, the kit uses exploits for Java, PDF, IE …
Featured news
Resources
Don't miss
- It’s time to give AI security its own playbook and the people to run it
- Kanvas: Open-source incident response case management tool
- 6 eye-opening books on AI’s rise, risks, and realities
- Check for CitrixBleed 2 exploitation even if you patched quickly! (CVE-2025-5777)
- Exposure management is the answer to: “Am I working on the right things?”